{"id":94953,"date":"2021-11-11T02:24:34","date_gmt":"2021-11-11T10:24:34","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=94953"},"modified":"2024-04-18T03:12:49","modified_gmt":"2024-04-18T10:12:49","slug":"highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/","title":{"rendered":"Highlights of Recent Mac Malware: OSX\/WizardUpdate and OSX\/Bundlore"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-33181\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/ventir-trojan-mac-malware.jpg\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/ventir-trojan-mac-malware.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/ventir-trojan-mac-malware-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/ventir-trojan-mac-malware-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Mac malware researchers constantly encounter new malware samples and variants. In recent weeks, two notable malware families introduced new malware variants in their infection campaigns.<\/p>\n<p>Here&#8217;s what you should know regarding two recently updated Mac malware families: <strong>OSX\/WizardUpdate<\/strong> and <strong>OSX\/Bundlore<\/strong>.<\/p>\n<h3>OSX\/WizardUpdate<\/h3>\n<p>It&#8217;s fairly rare that a piece of malware comes along just once and is then never heard from again. Some malware when first observed is a proof-of-concept (PoC) that later returns with more features, better obfuscation (self-hiding techniques), etc. Malware developers sometimes release their software out into the wild to see how it performs, then take that test data to make something that performs better.<\/p>\n<p>OSX\/UpdateAgent is a piece of malware that was first spotted in November of 2020, and was a simple infostealer at the time. There have been a few variants since then with minor tweaks, but now UpdateAgent\u2014also known as WizardUpdate\u2014is back with a new bag of tricks.<\/p>\n<p>The latest sample comes with several upgrades, including the ability to:<\/p>\n<ul>\n<li>deploy secondary payloads downloaded from cloud infrastructure<\/li>\n<li>grab the full download history by enumerating LSQuarantineDataURLString using SQLite (<a href=\"https:\/\/osxdaily.com\/2012\/07\/12\/list-download-history-mac-os-x\/\" target=\"_blank\" rel=\"noopener\">a technique written about nearly a decade ago<\/a>)<\/li>\n<li>bypass Gatekeeper by removing quarantine attributes from downloaded payloads<\/li>\n<li>modify PLIST files (e.g. app preferences) using PlistBuddy<\/li>\n<li>leverage existing user profiles to execute commands<\/li>\n<li>change the sudoers list to give admin permissions to regular users<\/li>\n<\/ul>\n<div id=\"attachment_94956\" style=\"width: 2010px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/WizardUpdateEvolution.jpg\" target=\"_blank\" rel=\"noopener\"><img aria-describedby=\"caption-attachment-94956\" loading=\"lazy\" class=\"wp-image-94956 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/WizardUpdateEvolution.jpg\" alt=\"\" width=\"2000\" height=\"1000\" \/><\/a><p id=\"caption-attachment-94956\" class=\"wp-caption-text\">The evolution of the OSX\/WizardUpdate malware family. Image credit: <a href=\"https:\/\/twitter.com\/MsftSecIntel\/status\/1451279679059488773\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a>.<\/p><\/div>\n<p>The new variant, first <a href=\"https:\/\/twitter.com\/MsftSecIntel\/status\/1451279679059488773\" target=\"_blank\" rel=\"noopener\">reported on by Microsoft<\/a>, utilizes new ways to evade detection and persist on an infected system. Distributed as a drive-by installer (something that will pop up on random websites) the latest variant was found as a fake Flash Player installer.<\/p>\n<p>After having been on its way out for years, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-adobe-flash-player-from-multimedia-to-malware\/\">Adobe Flash Player was discontinued in December 2020<\/a>. Browsers that had Flash Player built in removed the plugin, most websites that still served Flash content switched to HTML5 and other technologies, and Adobe even released a final &#8220;update&#8221; to Flash Player to prevent it from running.<\/p>\n<p>But, unfortunately, a lot of people are still tricked by malicious popups and messages such as this:<\/p>\n<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/flash-out-of-date.jpeg\" \/><\/p>\n<p>The appearance of these fake Flash Player update messages vary. But to this day, they still seem to be very effective in getting users to download whatever &#8220;update&#8221; is offered to them. OSX\/WizardUpdate is one such &#8220;fake updater&#8221; Trojan horse.<\/p>\n<p>Once installed on a system, OSX\/WizardUpdate removes all of the files, folders and other support files it created, and it hides itself in the user libraries where it creates and modifies .plist files to ensure it can persist after restarts and system migrations. It can do this thanks to the elevated privileges it received when a user typed in the administrator password required for installation.<\/p>\n<p>Users can often be easily tricked into typing their password when installing what they believe to be legitimate software. This is why one should be very cautious about where their software comes from. <strong>Always<\/strong> try to download software from the App Store whenever possible, or directly from the Web site that you know for sure belongs to the actual developer. <strong>Never<\/strong> install software that a Web site or browser popup prompts you to download or install.<\/p>\n<p>OSX\/WizardUpdate downloads additional payloads. One known payload, an OSX\/Adload variant, attempts to bypass the macOS Gatekeeper protection feature that&#8217;s supposed to flag downloads as potentially untrusted. By removing the quarantine flag on the payload files, the victim does not get a warning about the software being installed.<\/p>\n<div id=\"attachment_94957\" style=\"width: 1362px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/WizardUpdateSteps.png\" target=\"_blank\" rel=\"noopener\"><img aria-describedby=\"caption-attachment-94957\" loading=\"lazy\" class=\"wp-image-94957 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/WizardUpdateSteps.png\" alt=\"\" width=\"1352\" height=\"677\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/WizardUpdateSteps.png 1352w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/WizardUpdateSteps-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/WizardUpdateSteps-1024x513.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/WizardUpdateSteps-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/WizardUpdateSteps-768x385.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/WizardUpdateSteps-657x329.png 657w\" sizes=\"(max-width: 1352px) 100vw, 1352px\" \/><\/a><p id=\"caption-attachment-94957\" class=\"wp-caption-text\">The behaviors of recent OSX\/WizardUpdate and OSX\/Adload samples. Image credit: <a href=\"https:\/\/twitter.com\/MsftSecIntel\/status\/1451279684570804234\" target=\"_blank\" rel=\"noopener\">Microsoft<\/a>.<\/p><\/div>\n<p><span class=\"css-901oao css-16my406 r-poiln3 r-bcqeeo r-qvutc0\">The recently observed OSX\/Adload payload causes ads to be injected into whatever Web site the user visits. (<a href=\"https:\/\/www.intego.com\/mac-security-blog\/osx-adload-mac-malware-apple-missed-for-many-months\/\" target=\"_blank\" rel=\"noopener\">Intego previously wrote about OSX\/Adload<\/a> back in August.) But the rapid growth in OSX\/WizardUpdate&#8217;s sophistication implies that it could potentially install anything it wants, whenever it wants. This makes OSX\/WizardUpdate a piece of malware that you definitely don&#8217;t want on your system.<\/span><\/p>\n<p>Microsoft stated, &#8220;<span class=\"css-901oao css-16my406 r-poiln3 r-bcqeeo r-qvutc0\">Given its history, this Trojan will likely continue to grow in sophistication.<\/span>&#8221; Thus, it&#8217;s important to stay protected by using active anti-malware protection, like Intego VirusBarrier X9 provides.<\/p>\n<p><span class=\"css-901oao css-16my406 r-poiln3 r-bcqeeo r-qvutc0\">VirusBarrier detects WizardUpdate as <strong>OSX\/WizardUpdate.H<\/strong>, and the Adload payloads as <strong>OSX\/Adload.<\/strong><\/span><\/p>\n<h3>OSX\/Bundlore<\/h3>\n<p>The OSX\/Bundlore malware dropper family has been around for many years. This malware consists of software installers that deceive users into thinking some legitimate software is being installed, while in fact malware is being installed instead. Alternatively, malware may be installed alongside the actual software.<\/p>\n<p>Recently <a href=\"https:\/\/twitter.com\/Confiantintel\/status\/1451641996800454660\" target=\"_blank\" rel=\"noopener\">a new Bundlore variant was found<\/a> that poses as a Flash Player installer (surprise, surprise). The installer will load an invisible helper file, which in turn loads a shell script, which then downloads and executes Bundlore from a malicious domain, <code>qaeqxa[.]pw<\/code>.<\/p>\n<p>The whole process uses XOR to obfuscate it&#8217;s actions and movements. XOR (<span class=\"ILfuVd\"><span class=\"hgKElc\">e<strong>X<\/strong>clusive <strong>OR<\/strong>) is popular way to hide data from untrained eyes, as the XORed data needs a key to be deciphered. Luckily, XOR is typically very easy to decipher\u2014although sometimes malware authors will double-cycle XOR the data which makes it harder to translate garbled data into readable text.<\/span><\/span><\/p>\n<p>This Bundlore dropper uses such an approach, as documented by Confiant in the following screenshot (note all of the &#8220;xor&#8221; in the left column).<\/p>\n<div id=\"attachment_94959\" style=\"width: 1988px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/Bundlore-XOR.jpg\" target=\"_blank\" rel=\"noopener\"><img aria-describedby=\"caption-attachment-94959\" loading=\"lazy\" class=\"wp-image-94959 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/Bundlore-XOR.jpg\" alt=\"\" width=\"1978\" height=\"1272\" \/><\/a><p id=\"caption-attachment-94959\" class=\"wp-caption-text\">The latest OSX\/Bundlore variant uses XOR to obfuscate its code. Image credit: <a href=\"https:\/\/twitter.com\/ConfiantIntel\/status\/1451641996800454660\" target=\"_blank\" rel=\"noopener\">Confiant<\/a>.<\/p><\/div>\n<p>The shell script that is decoded by the invisible helper file is also heavily obfuscated with XOR, but once the obfuscation is removed the data becomes readable and the script&#8217;s true intentions become known.<\/p>\n<div id=\"attachment_94960\" style=\"width: 1228px\" class=\"wp-caption alignnone\"><img aria-describedby=\"caption-attachment-94960\" loading=\"lazy\" class=\"wp-image-94960 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/Bundlore-XOR-1.jpg\" alt=\"\" width=\"1218\" height=\"232\" \/><p id=\"caption-attachment-94960\" class=\"wp-caption-text\">This OSX\/Bundlore variant downloads an additional payload from a malicious domain. Image credit: <a href=\"https:\/\/twitter.com\/ConfiantIntel\/status\/1451641996800454660\" target=\"_blank\" rel=\"noopener\">Confiant<\/a>.<\/p><\/div>\n<p>This fake Flash Player was signed with the developer<span class=\"css-901oao css-16my406 r-poiln3 r-bcqeeo r-qvutc0\"> certificate &#8220;Tadarrius Rashard Campbell (B9L873SNL3)&#8221; <\/span>and notarized by Apple. Unfortunately, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/notarization\/\">Apple often notarizes Mac malware<\/a>. <span class=\"css-901oao css-16my406 r-poiln3 r-bcqeeo r-qvutc0\">Apple was notified when this discovery was made, and they promptly revoked the certificate associated with this account.<\/span><\/p>\n<p>Of course, we can expect to see further variants that simply pivot to another Apple Developer ID instead.<\/p>\n<p>When we last checked, the second-stage malware URL was pushing an OSX\/Pirrit spyware installer.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/OSX-Pirrit-clt.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"aligncenter wp-image-94966 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/OSX-Pirrit-clt.png\" alt=\"\" width=\"1200\" height=\"830\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/OSX-Pirrit-clt.png 1200w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/OSX-Pirrit-clt-300x208.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/OSX-Pirrit-clt-1024x708.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/OSX-Pirrit-clt-150x104.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/OSX-Pirrit-clt-768x531.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/11\/OSX-Pirrit-clt-657x454.png 657w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><\/p>\n<p>VirusBarrier detects this Bundlore variant as <strong>OSX\/Bundlore.BEa<\/strong> and the current next-stage malware as <strong>OSX\/Pirrit.clt<\/strong>.<\/p>\n<h3>How can one remove or prevent OSX\/WizardUpdate, OSX\/Bundlore, and other threats?<\/h3>\n<p>Given that Apple&#8217;s threat mitigation features such as notarization, Gatekeeper, XProtect, and MRT do not block many types of threats, it is evident that Apple\u2019s own macOS protection methods are insufficient by themselves.<\/p>\n<p><em>Related: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/\">Do Macs need antivirus software?<\/a><\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"3jAvZjpyXD\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/\">Do Macs need antivirus software?<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Do Macs need antivirus software?&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/do-macs-need-antivirus-software\/embed\/#?secret=3jAvZjpyXD\" data-secret=\"3jAvZjpyXD\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, can protect against, detect, and eliminate both <strong>OSX\/WizardUpdate<\/strong> and <strong>OSX\/Bundlore<\/strong>, as well as related malware, and all other Mac malware families.<\/p>\n<p>VirusBarrier is designed by Mac security experts, and it protects against a much wider variety of malware than Apple\u2019s mitigation methods.<\/p>\n<p>If you believe your Mac may have been infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time scanning<\/a>, such as <a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego VirusBarrier X9<\/a>\u2014which also protects Macs from M1-native malware, cross-platform malware, and more. <strong>Intego recently earned a 100% detection rating for Mac malware<\/strong> in two independent tests conducted by <a href=\"https:\/\/www.av-comparatives.org\/tests\/mac-security-test-review-2021\/#intego\" target=\"_blank\" rel=\"noopener\">AV-Comparatives<\/a> and <a href=\"https:\/\/www.av-test.org\/en\/antivirus\/home-macos\/macos-bigsur\/june-2021\/intego-virusbarrier-10.9-215205\/\" target=\"_blank\" rel=\"noopener\">AV-TEST<\/a>.<\/p>\n<p><span style=\"font-size: small;\">Note: Intego customers running VirusBarrier X8, X7, or X6 on older versions of Mac OS X are also protected from these threats. It is best to upgrade to the latest versions of VirusBarrier and macOS, if possible, to ensure your Mac gets all the latest security updates from Apple<\/span><span style=\"font-size: small;\">.<\/span><\/p>\n<h3>How can I learn more?<\/h3>\n<p>For more details about the recent OSX\/WizardUpdate campaign, you can read <a href=\"https:\/\/twitter.com\/MsftSecIntel\/status\/1451279679059488773\" target=\"_blank\" rel=\"noopener\">Microsoft&#8217;s Twitter thread<\/a>. For further information about the recent OSX\/Bundlore campaign, see <a href=\"https:\/\/twitter.com\/ConfiantIntel\/status\/1451641996800454660\" target=\"_blank\" rel=\"noopener\">Confiant&#8217;s Twitter thread<\/a>.<\/p>\n<p>We discussed these threats\u00a0on <a href=\"https:\/\/podcast.intego.com\/213\">episode 213<\/a> of the <a href=\"https:\/\/podcast.intego.com\/\"><strong>Intego Mac Podcast<\/strong><\/a>. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mac malware researchers constantly encounter new malware samples and variants. In recent weeks, two notable malware families introduced new malware variants in their infection campaigns. Here&#8217;s what you should know regarding two recently updated Mac malware families: OSX\/WizardUpdate and OSX\/Bundlore. OSX\/WizardUpdate It&#8217;s fairly rare that a piece of malware comes along just once and is [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":33187,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[4625,4096],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Mac malware researchers constantly encounter new malware samples and variants. In recent weeks, two notable malware families introduced new malware\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Highlights of Recent Mac Malware: OSX\/WizardUpdate and OSX\/Bundlore - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Mac malware researchers constantly encounter new malware samples and variants. In recent weeks, two notable malware families introduced new malware\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-11T10:24:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-18T10:12:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg\",\"width\":400,\"height\":260,\"caption\":\"Mac malware Trojan horse\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/\",\"name\":\"Highlights of Recent Mac Malware: OSX\/WizardUpdate and OSX\/Bundlore - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#primaryimage\"},\"datePublished\":\"2021-11-11T10:24:34+00:00\",\"dateModified\":\"2024-04-18T10:12:49+00:00\",\"description\":\"Mac malware researchers constantly encounter new malware samples and variants. In recent weeks, two notable malware families introduced new malware\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Highlights of Recent Mac Malware: OSX\/WizardUpdate and OSX\/Bundlore\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Highlights of Recent Mac Malware: OSX\/WizardUpdate and OSX\/Bundlore\",\"datePublished\":\"2021-11-11T10:24:34+00:00\",\"dateModified\":\"2024-04-18T10:12:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#webpage\"},\"wordCount\":1401,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg\",\"keywords\":[\"OSX\/Adload\",\"OSX\/Bundlore\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Mac malware researchers constantly encounter new malware samples and variants. In recent weeks, two notable malware families introduced new malware","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/","og_locale":"en_US","og_type":"article","og_title":"Highlights of Recent Mac Malware: OSX\/WizardUpdate and OSX\/Bundlore - The Mac Security Blog","og_description":"Mac malware researchers constantly encounter new malware samples and variants. In recent weeks, two notable malware families introduced new malware","og_url":"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/","og_site_name":"The Mac Security Blog","article_published_time":"2021-11-11T10:24:34+00:00","article_modified_time":"2024-04-18T10:12:49+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg","width":400,"height":260,"caption":"Mac malware Trojan horse"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/","name":"Highlights of Recent Mac Malware: OSX\/WizardUpdate and OSX\/Bundlore - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#primaryimage"},"datePublished":"2021-11-11T10:24:34+00:00","dateModified":"2024-04-18T10:12:49+00:00","description":"Mac malware researchers constantly encounter new malware samples and variants. In recent weeks, two notable malware families introduced new malware","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Highlights of Recent Mac Malware: OSX\/WizardUpdate and OSX\/Bundlore"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Highlights of Recent Mac Malware: OSX\/WizardUpdate and OSX\/Bundlore","datePublished":"2021-11-11T10:24:34+00:00","dateModified":"2024-04-18T10:12:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#webpage"},"wordCount":1401,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg","keywords":["OSX\/Adload","OSX\/Bundlore"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/highlights-of-recent-mac-malware-osx-wizardupdate-and-osx-bundlore\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/10\/Ventir-Trojan-Horse.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oHv","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94953"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=94953"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94953\/revisions"}],"predecessor-version":[{"id":94969,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94953\/revisions\/94969"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/33187"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=94953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=94953"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=94953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}